Results 21 to 30 of about 6,728,968 (223)
An innovative approach for dynamic key dependent S-Box to enhance security of IoT systems
The Internet of Things (IoT) foresees pervasive and connected smart nodes that interact independently while offering varied services. Today, IoT nodes are a treasure house of data and hence security has become a major concern in IoT networks ...
Divya James, TKS Lakshmi Priya
doaj +1 more source
Throwing Boomerangs into Feistel Structures
Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on ciphers based on a Substitution Permutation Network (SPN), while analyzing the Feistel structure is
Hosein Hadipour +2 more
doaj +1 more source
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA) [PDF]
This paper attempts to develop a simple, stronger and safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption.
Gaidaa Saeed Mahdi
doaj +1 more source
On groups generated by ciphers based on Feistel network
Исследуются шифры, построенные по схеме Фейстеля, у которых функции усложнения представляют собой одну или несколько итераций XSL-схемы. Приводятся достаточные условия, при которых итерационные преобразования таких шифров порождают знакопеременную группу.
V. Antipkin, Dmitrii O. Pasko
semanticscholar +1 more source
Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand +2 more
doaj +1 more source
Best Effort and Practice Activation Codes [PDF]
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S. +4 more
core +4 more sources
Abstract We address the question of how to use a machine learned (ML) parameterization in a general circulation model (GCM), and assess its performance both computationally and physically. We take one particular ML parameterization (Guillaumin & Zanna, 2021, https://doi.org/10.1002/essoar.10506419.1) and evaluate the online performance in a different ...
Cheng Zhang +5 more
wiley +1 more source
In IoT sensors, which are used to record and send images, secure image transmission is of great importance. Therefore, we need to use encryption, watermarking and compression processes. Here, a new integrated method of lightweight encryption, watermarking and compression for the fast and secure transmission of images is proposed.
Hadi Nazari +2 more
wiley +1 more source
Feistel Network Assisted Dynamic Keying based SPN Lightweight Encryption for IoT Security
In the last few years Internet-of-Things (IoT) technology has emerged significantly to serve varied purposes including healthcare, surveillance and control, business communication, civic administration and even varied financial activities.
K. Gurumanapalli, Nagendra Muthuluru
semanticscholar +1 more source
Differential analysis of the NBC algorithm based on mixed integer linear programming model
Abstract This paper mainly studies mixed integer linear programming (MILP)‐based cryptanalysis on round‐reduced NBC algorithm with generalized Feistel structure. First, each component of the algorithm is equivalently described by linear inequality equations, and the propagation rules of differential characteristics and linear approximation are ...
Lan Zhang, Bin Yu, Liangsheng He
wiley +1 more source

